Learn your way! Get started

Burp Suite Community Edition, Part 2 of 4: Dashboard and Live Task

with expert Atul Tiwari


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 11/11/2021
Level Beginner
Runtime 2h 32m
Closed captioning Included
Transcript Included
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Burp Suite is a set of tools to test web applications for penetration testing. Burp suite community edition gives tools and strategy to assist in hunting and finding bugs on the target platforms. This course covers: Burp Dashboard, Repeater module, Attack Types, and payloads and hidden form fields.

Prerequisites

Web application development and HTML knowledge are required

Meet the expert

Atul has been involved in information security,  IT auditing, and  penetration testing web apps in the field of information security training for over 8 years.

Course outline



Module 3

Burp Dashboard and Live Task (38:27)
  • Introduction (00:08)
  • Burp Dashboard and live task (04:11)
  • New Live Passive Scan (06:25)
  • Individual Tasks (05:42)
  • Burp UserOptions and ProjectOptions customisations (05:01)
  • User Options (04:02)
  • Reload Options (04:52)
  • Preserve User Options (03:19)
  • Override User Options (04:35)
  • Summary (00:08)
Repeater Module Testing (34:43)
  • Introduction (00:08)
  • Repeater module testings (04:37)
  • Searching (05:42)
  • Request Tips (08:45)
  • Burp intruder Configurations (05:16)
  • Intruder Options (02:59)
  • Attack Types Overview (07:04)
  • Summary (00:08)

Module 4

Burp Intruder Attack Types (29:13)
  • Introduction (00:08)
  • Burp Intruder attack types - Attacks (05:38)
  • Battering Ram and Pitchfork (05:25)
  • Cluster Bomb (08:46)
  • Payload processing and bruteforcer (04:51)
  • Payload Processing Rules (04:15)
  • Summary (00:08)
Grep-extract with Cluster Bomb (26:36)
  • Introduction (00:08)
  • Grep-Match _ Grep-extract with clustor bomb (06:40)
  • Match Unique Value (06:04)
  • Valid User (04:57)
  • SQL Injection Ninja (04:45)
  • Match Expressions for SQL Injection (03:51)
  • Summary (00:08)
Payload Types and Hidden Form Fields (23:16)
  • Introduction (00:08)
  • Some Best payloads type used and hidden form fiel (06:07)
  • Null Payload and Other Types (12:39)
  • Username Request and Response (00:08)
  • User names generator (04:04)
  • Summary (00:08)